default search action
42nd ACM Southeast Regional Conference 2004: Huntsville, Alabama, USA
- Seong-Moo Yoo, Letha H. Etzkorn:
Proceedings of the 42nd Annual Southeast Regional Conference, 2004, Huntsville, Alabama, USA, April 2-3, 2004. ACM 2004, ISBN 1-58113-870-9
Special session on mobile computing #1
- Michael R. Bartolacci, Boris Peltsverger, Abdullah Konak, Svetlana Peltsverger:
Allocation of multiple wireless access points in mobile networks. 1-4 - Stanislav Kurkovsky, Bhagyavati, Arris Ray:
A collaborative problem-solving framework for mobile devices. 5-10 - Rion Dooley:
A quadtree dictionary approach to multi-resolution compression. 11-16 - Jennifer M. Bennett, Mickey L. Armstrong, Swapna Gupta:
A Message Board Client for handheld devices. 17-18 - Mark James Burge:
Developing smart card applications using the OpenCard Framework. 19-24
Special session on mobile computing #2
- Mohammad Al-Shurman, Seong-Moo Yoo, Seungjin Park:
A performance simulation for route maintenance in wireless ad hoc networks. 25-30 - Manish Mohan, Laurie L. Joiner:
Solving billing issues in ad hoc networks. 31-36 - Christopher Williams, Mark James Burge:
MIDP 2.0 changing the face of J2ME gaming. 37-41 - Tacksoo Im, Mário Guimarães, Kenneth E. Hoganson:
An N-Tier Client/Server course: a classroom experience. 42-45 - Bhagyavati, Tena F. McQueen:
Incorporating wireless into the computer science curriculum. 46-51
Special session on mobile computing #3
- Yu Wang:
An FSM model for situation-aware mobile application software systems. 52-57 - Xin Zheng:
Agent construction in Mobile Surveyor. 58-63 - Shuang Liu, Olga V. Gavrylyako, Phillip G. Bradford:
Implementing the TEA algorithm on sensors. 64-69 - Qunwei Zheng, Xiaoyan Hong, Sibabrata Ray:
Recent advances in mobility modeling for mobile ad hoc network research. 70-75 - John Calagaz, Wade Chatam, Brian Eoff, John A. Hamilton Jr.:
On the current state of transport layer protocols in mobile ad hoc networks. 76-81
Networking
- Saad Biaz, Yawen Dai Barowski:
"GANGS": an energy efficient MAC protocol for sensor networks. 82-87 - Rajiv K. Nekkanti, Chung-wei Lee:
Trust based adaptive on demand ad hoc routing protocol. 88-93 - Saad Biaz, Yiming Ji:
A glance at MAC protocols for ultra wideband. 94-95 - Mohammad Al-Shurman, Seong-Moo Yoo, Seungjin Park:
Black hole attack in mobile Ad Hoc networks. 96-97
Software engineering #1
- Mohsen N. AlSharif, Walter P. Bond, Turky N. Al-Otaiby:
Assessing the complexity of software architecture. 98-103 - Turky N. Al-Otaiby, Walter P. Bond, Mohsen AlSherif:
Sotware modularization using requirements attributes. 104-109 - Haining Yao, Letha H. Etzkorn:
Towards a semantic-based approach for software reusable component classification and retrieval. 110-115 - Qiaozhu Mei:
A knowledge processing oriented life cycle study from a Digital Museum system. 116-121 - Minhui Xie, Mark Tomlinson, Bobby Bodenheimer:
Interface design for a modern software ticketing system. 122-127
Software engineering #2
- John E. Booker, Christa M. Chewar, D. Scott McCrickard:
Usability testing of notification interfaces: are we focused on the best metrics? 128-133 - Samira Sadaoui, Pengzhou Yin:
Generalization for component reuse. 134-139 - Yanhong Sun, Edward L. Jones:
Specification-driven automated testing of GUI-based Java programs. 140-145 - Cara Stein, Letha H. Etzkorn, Dawn R. Utley:
Computing software metrics from design documents. 146-151 - Pallavi Tadepalli, H. Conrad Cunningham:
JavaCHIME: Java class hierarchy inspector and method executer. 152-157
Software engineering and middleware
- Joel Jones, Randy Smith:
Automated auditing of design principle adherence. 158-159 - Song Zhou, Chuanxi Xu, Hui Wu, Jing Zhang, Yuehua Lin, Juanqin Wang, Jeff Gray, Barrett R. Bryant:
E-R modeler: a database modeling toolkit for Eclipse. 160-165 - Emre Turkay, Aniruddha S. Gokhale, Balachandran Natarajan:
Addressing the middleware configuration challenges using model-based techniques. 166-170 - George T. Edwards, Douglas C. Schmidt, Aniruddha S. Gokhale:
Integrating publisher/subscriber services in component middleware for distributed real-time and embedded systems. 171-176 - Yi Liu, H. Conrad Cunningham:
Mapping component specifications to Enterprise JavaBeans implementations. 177-182 - Devyani Pujari, Niral Jhaveri, Juan Carlos Guzman:
XML middleware to services on STB. 183-184
Security
- Geetha Ramachandran, Delbert Hart:
A P2P intrusion detection system based on mobile agents. 185-190 - Milena Milenkovic, Aleksandar Milenkovic, Emil Jovanov:
A framework for trusted instruction execution via basic block signature verification. 191-196 - Jay-Evan J. Tevis, John A. Hamilton Jr.:
Methods for the prevention, detection and removal of software security vulnerabilities. 197-202 - Jia-Zhu Dai, Xiao-Hu Yang, Jinxiang Dong:
A privacy-protecting proxy signature scheme and its application. 203-206 - Boumediene Belkhouche, Anastasia Nix, Johnette Hassell:
Plagiarism detection in software designs. 207-211 - Ning Hu, Randy K. Smith, Phillip G. Bradford:
Security for fixed sensor networks. 212-213
Theory
- Guangming Xing:
A simple way to construct NFA with fewer states and transitions. 214-218 - Suk Jai Seo, Ashok T. Amin:
Algorithms for optimal orientations of a unicyclic graph. 219-223 - John K. Johnstone:
Giftwrapping a curve with the convex hull. 224-227 - B. John Oommen, Jack R. Zgierski, Doron Nussbaum:
Deterministic Majority filters applied to stochastic sorting. 228-233 - Jeremy Fisher, Alan P. Sprague:
Anchors: a technique of pre-classification and its effects on Hidden Markov Models. 234-239
Theory & human computer interaction & programming languages
- Margaret Ann Francel, David J. John:
An algorithm for constructing an even grammar from a language sample. 240-245 - Yonghui Chen, Alan P. Sprague:
Exploration on the commonality of hierarchical clustering algorithms. 246-247 - Yifang Gu, Juan E. Gilbert:
The development of a Voice System that interacts with a student information database. 248-252 - Lynn D. McKinnon, Max M. North:
A comparative study of presence in virtual reality vs. presence in the real world. 253-254 - Nattawut Sridranop, Ryan Stansifer:
Adding polymorphic tuples and lists to the syntax of Java. 255-260 - Swathi Tanjore Gurumani, Aleksandar Milenkovic:
Execution characteristics of SPEC CPU2000 benchmarks: Intel C++ vs. Microsoft VC++. 261-266
Architecture & distributed systems
- Hussein Al-Zoubi, Aleksandar Milenkovic, Milena Milenkovic:
Performance evaluation of cache replacement policies for the SPEC CPU2000 benchmark suite. 267-272 - Rami A. AL-Na'mneh, W. David Pan, B. Earl Wells:
Two parallel implementations for one dimension FFT on symmetric multiprocessors. 273-278 - Chia-Chu Chiang:
Low-level language constructs considered harmful for distributed parallel programming. 279-284 - Xiang Zhao, Phil G. Richards, Sijun Zhang:
A parallel algorithm for Algebraic MultiGrid. 285-290 - J. T. McClain, Bradley J. Wimpey, D. H. Barnhard, Walter D. Potter:
Distributed robotic target acquisition using Bluetooth communication. 291-296
Architecture & distributed systems & e-commerce
- Ahmed Charles, Ronaldo Menezes, Robert Tolksdorf:
On the implementation of SwarmLinda. 297-298 - Enis Afgan:
Role of the resource broker in the Grid. 299-300 - Xiang Zhao, Phil G. Richards, Sijun Zhang:
A parallel unstructured Chimera grid method. 301-302 - Shih-Hsi Liu:
Validation of Distributed Real-Time and Embedded System composition in UniFrame. 303-304 - Yiming Ji, Kai H. Chang, Patrick O. Bobbie:
Interactive software architecture design with modeling & simulation. 305-306 - Tobin Jackson, Delbert Hart:
Data decoys for confidentiality in a distributed computation: matrix multiplication. 307-308 - R. Todd Stephens:
A framework for the identification of electronic commerce design elements that enable trust within the small hotel industry. 309-314 - Patricia Lanford, Roland Hübscher:
Trustworthiness in e-commerce. 315-319 - Andrea Edwards:
Using a parallel genetic algorithm to design vibratory bowl feeders. 320-325
Special session on software systems #1
- Ramón Zatarain, Ryan Stansifer:
A model of CPS translation and interpretation. 326-331 - Bina Shah, Rachael Dennison, Jeff Gray:
A model-driven approach for generating embedded robot navigation control software. 332-335 - Medha Shukla Sarkar:
GXL: a new graph transformation language. 336-340 - Changlin Sun:
Empirical reasoning about quality of service of component-based distributed systems. 341-346 - Sarah Monisha Pulimood, Boumediene Belkhouche:
A Mobile Computational model for Internet programming. 347-352
Special session on software systems #2
- Gan Deng, Aniruddha S. Gokhale, Balachandran Natarajan:
Model-driven integration of federated event services in real-time component middleware. 353-356 - Alain Fabian, David Felton, Melissa Grant, Cyril Montabert, Kevin Pious, Nima Rashidi, Anderson Ray Tarpley III, Nicholas Taylor, Christa M. Chewar, D. Scott McCrickard:
Designing the claims reuse library: validating classification methods for notification systems. 357-362 - Maureen Ann Raley, Letha H. Etzkorn:
Case study: lessons learned during a nationwide computer system upgrade. 363-368
Artificial intelligence #1
- Marvin Roe, Brian Bourgeois, Patrick McDowell:
Multi-robot position tracking. 369-374 - Huanjing Wang, Hui-Chuan Chen, Allen S. Parrish:
Automated selection of auto crash causes. 375-378 - Yuki Ono, Hajime Uchiyama, Walter D. Potter:
A mobile robot for corridor navigation: a multi-agent approach. 379-384 - Hiu S. Yau, J. Scott Hawker:
SA_MetaMatch: relevant document discovery through document metadata and indexing. 385-390 - Ronald C. Linton:
Adapting binary fitness functions in Genetic Algorithms. 391-395
Artificial intelligence #2
- Andy Tinkham, Ronaldo Menezes:
Simulating robot collective behavior using StarLogo. 396-401 - Ying Liu, Alan P. Sprague, Elliot J. Lefkowitz:
Network flow for outlier detection. 402-103 - Faizan Javed, Barrett R. Bryant, Matej Crepinsek, Marjan Mernik, Alan P. Sprague:
Context-free grammar induction using genetic programming. 404-405 - Shauntrelle D. Davis, Tia B. Walton:
Engineering knowledge. 406-407 - Wan Huang, David Cordes:
Knowledge-contribution motivated adaptive neighborhood for multi-agent communities. 408-409 - Kirk Thomas:
Developing a language to describe world conflicts. 410-411 - Najaf Ali Shah, Ehab M. ElBahesh:
Topic-based clustering of news articles. 412-413 - Astrid Glende:
Agent design to pass computer games. 414-415
Education/distance learning
- S. Wang, Timothy A. Davis, Robert Geist, James Westall, John L. Kundert-Gibbs:
Digital production arts: coming soon to a college near you! 416-421 - José M. Garrido, Kyungsoo Im:
Teaching object-oriented simulation with PsimJ simulation package. 422-427 - Ravi Darbhamulla, Pamela B. Lawhead:
Paving the way towards an efficient Learning Management System. 428-433 - Rebecca F. Bruce, J. Dean Brock, Kenneth Bogert:
X-Lab: XML-based laboratory exercises for CS1. 434-435 - Mário Guimarães:
The Kennesaw Database Courseware (KDC) with an evaluation component. 436-439 - Joseph A. Driscoll, Ralph M. Butler, Joelle M. Key:
A virtual machine environment for teaching the development of system software. 440-441
Visualization/graphics/image processing
- Danyu Liu, Alan P. Sprague, Upender Manne:
JRV: an interactive tool for data mining visualization. 442-447 - M. Eduard Tudoreanu, Delbert Hart:
Interactive legends. 448-453 - Yiming Ji, Kai H. Chang, Chi-Cheng Hung:
Efficient edge detection and object segmentation using Gabor filters. 454-459 - Zexin Pan, W. David Pan, Aleksandar Milenkovic:
Complexity-distortion tradeoffs in variable complexity 2-D DCT. 460-465 - Mahesh Nalasani, W. David Pan, Seong-Moo Yoo:
Motion estimation with integrated motion models. 466-467 - Dorian A. Flowers:
Investigating steganography. 468-469
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.